Post Views: 7,328 In the current article, we review the use of the PowerShell cmdlet – Restore-RecoverableItems. Restore deleted mail items to their original folder using PowerShell| The article series The article series includes the following articles: Restore deleted mail items to their original folder using PowerShell – introduction | 1#3 Display information about Deleted…

Post Views: 8,382 In the current article, we review how to display information about deleted mail items, by using the PowerShell cmdlet – Get-RecoverableItems. Restore deleted mail items to their original folder using PowerShell| The article series The article series includes the following articles: Restore deleted mail items to their original folder using PowerShell –…

Post Views: 9,065 The current article series is dedicated to the subject of – Viewing + Restoring deleted mail items from an Exchange Online mailbox, to their original folder, using two new PowerShell cmdlets – Get-RecoverableItems and Restore-RecoverableItems. Restore deleted mail items to their original folder using PowerShell| The article series The article series includes…

Post Views: 9,696 In the current article series, we review how to use the Office 365 Search Content feature, as a tool, that we can use for exporting the content of Exchange Online mailbox to a PST file. Office 365 content search | The article series The article series includes the following articles: Using Office…

Post Views: 8,225 In this article, we review in detailed step by step description of the process of – exporting the content of Exchange Online mailbox to a PST file. Office 365 content search | The article series The article series includes the following articles: Using Office 365 content search for exporting deleted mail items…

Post Views: 6,987 In this article, we review the process of importing a PST file to an Outlook mail profile + how to review the information that is stored in the “Recoverable items” folder. Office 365 content search | The article series The article series includes the following articles: Using Office 365 content search for…

Post Views: 8,532 The current article we review the second solution that we can use for – dealing with a common Exchange Online mailbox restore mistake that occurs in Office 365 Directory synchronization environment or Exchange Hybrid environment. In our scenario Exchange, Online mailbox deleted because of the event in which an On-Premise Active Directory…

Post Views: 7,633 This current article is the second article in a series of two articles. In the former article, we review in high level the components and the concepts that involved throughout the process of importing PST files to Exchange Online mailboxes.The current article, serve as a step by step guide which includes a…

Post Views: 7,196 The current article is the first article in a series of two articles, which describe the process of importing PST files to Office 365 (or if we want to be more accurate Exchange Online mailboxes) by using the “Azure Storage Explorer” graphic utility. Article series The current article provides a high-level review…

Post Views: 6,547 The PowerShell Get-MailDetailSpamReport cmdlet was created as a tool that simplifies the process of viewing and “dumping” information stored in Exchange Online spam log file.The Exchange Online spam log file, serve as a store that holds the documentation for each of the “spam mail events” that relates to incoming and outgoing mail…

Post Views: 19,516 The current article is the first article in a three-article series. The Purpose of this article series is to Show you a relatively new PowerShell cmdlet named – Get-MailDetailSpamReport, that was created for Exchange Online and Office 365 administrator that need to view and export information stored in Exchange Online spam mail…

Post Views: 10,211 In the current article, we review how to manage the option of – Focused Inbox in Office 365 by using PowerShell. Generally speaking, we can enable or disable the option Focused Inbox in “organization level” by using the PowerShell cmdlet – Get-OrganizationConfig or by managing single Exchange mailbox” by using the PowerShell…

Post Views: 10,483 In this article, we review various scenarios of using the Search-Mailbox cmdlet for deleting mail items from a Single Exchange mailbox (Bulk Deletion). In the former article – we review various scenarios of using the Search-Mailbox cmdlet for deleting mail items from multiple Exchange mailboxes (Bulk Deletion). PowerShell | Help & additional…

Post Views: 7,471 The current article serves as an introduction to the subject of Deleting mail items using the Search-Mailbox cmdlet. In this article, we review some various scenarios of using the Search-Mailbox cmdlet for deleting mail items from multiple Exchange mailboxes (Bulk Deletion). PowerShell | Help & additional information Running PowerShell commands…

Post Views: 6,738 In the current article, we will review how to use the PowerShell cmdlet Search-Mailbox for -recover mail item stored in the Recovery mail folder (also named the Dumpster).The recovery mail folder considers as a “system folder” and it’s not visible to the user (mailbox owner). PowerShell | Help & additional information Running…

Post Views: 7,017 In the current article, we will review how to use the Search-Mailbox PowerShell cmdlet for performing a search on a specific Exchange mailbox + copy the search results to a “destination mailbox” (Target Mailbox). PowerShell | Help & additional information Running PowerShell commands in Office 365 based environment To be able to…

Post Views: 19,699 The current article series deal with a very useful and powerful PowerShell command named – Search-Mailbox . I relate to the Search-Mailbox PowerShell command as a “Swiss Knife” because we can use the Search-Mailbox PowerShell command for many types of scenarios. What does the Search-Mailbox PowerShell command do? The Search-Mailbox PowerShell…

Post Views: 7,589 In the following article and the next article, we review the various PowerShell cmdlets, that we can use for view, and export information about the process of Exchange mailbox migration process. Most of the time, the main use for viewing and export information about the mailbox migration process is, for the purpose…

Post Views: 16,736 In the current article and the next article, we review the various PowerShell cmdlets that we can use for viewing and export information about the process of Exchange mailbox migration process. The “mailbox migration” PowerShell commands that we review in this article are: Get-MigrationBatch Get-MoveRequest Get-MoveRequestStatistics 1. Migration batches | Get-MigrationBatch The…

Post Views: 6,302 In the following article, we review how to use the “Export mailbox migration information and troubleshooting” PowerShell script. The PowerShell script structure The menu PowerShell script is dived to couple of sections that we will review later in the article. The PowerShell script was designed to work in two different environments: Office…

Post Views: 8,774 The current article is the continuation of the former article, in which we review the various PowerShell cmdlets that we can use for viewing, and export information about the process of Exchange mailbox migration process. The “mailbox migration” PowerShell commands that we review in this article are: Get-MigrationStatistics Get-MigrationUser Get-MigrationUserStatistics In addition,…

Post Views: 11,106 The current article is the first article in a series of five articles, that deal with the subject of using PowerShell as a tool for getting information about the mailbox migration process from the On-Premise environment to Office 365 (Exchange Online).In the first article, we review the following subjects: The various entities…

Post Views: 7,158 In the current article, we were complete to process of “Enabling Outbound DKIM signing” in an Office 365 based environment.In addition, we review how to verify that the process of outgoing DKIM signature is implemented properly. Activating (enabling) the Outbound DKIM signing for our domain name In this phase, we assume that…

Post Views: 11,751 In the current article, we review to process of – how to verify the DNS CNAME DKIM records, that represent a domain hosted at Office 365. The process of verifying the Office 365 DKIM CNAME records include three parts: Verify that the two CNAME records were successfully published. Verify that the CNAME…

Post Views: 18,198 In the current article, we provide step by step guideline, for the task of – creating the required two “DKIM CNAME records,” that we needed to publish. This is a preliminary step that we must complete. Only after the required “DKIM CNAME” records were successfully created, we can continue to the last…

Post Views: 8,912 The task of getting the value of the DKIM records for a specific domain name in Office 365 based environment, can be described as a “challenging task, ” because, at the current time, there is no “user-friendly” graphic interface that can provide us the information that we need. The only way for…

Post Views: 6,727 In the current article, we review the “formula” that we can use for calculating the value of the two Office 365 DKIM selector TXT record host names who contain the Public Key that the Office 365 DKIM selector use for signing outbound mail. In the past, to the only way for getting…

Post Views: 6,794 In the current article, I would like to provide a basic review of the PowerShell script that I created that will help you to implement various tasks that relate to E-mail address management in Office 365 and Exchange Online based environment. The structure of the – “Manage E-mail addresses menu based PowerShell…

Post Views: 9,396 In the current article, we review the process in which we use PowerShell for creating a search in Office 365 and Exchange Online environment, looking for a “hidden” or “ghost” E-mail address. The term “ghost E-mail address” is not a technical term but instead, a term that I use for describing…

Post Views: 22,630 In this article, we review the subject of removing (deleting) E-mail address by using PowerShell. The subject of – “removing existing E-mail address” using PowerShell can cause some confusion because there are two types of “deletion operations” that depend on the specific PowerShell command syntax that we use. The two methods for…

Post Views: 16,170 In the current article, we review the scenario in which we use PowerShell for searching for an E-mail address with a specific domain name suffix. In our case, we review a scenario which I defined as “unified search” because that search will “run” on two different Office 365 infrastructures:…

Post Views: 12,782 The current article we review the PowerShell command syntax, that we use for “constructing” a query, for searching specific E-mail address using the PowerShell where filter. The thing that we need to know before we start the search for E-mail address In this section, I would like to briefly review the main…

Post Views: 7,560 Addressing “recipient’s objects” in Exchange Online and Azure Active Directory environment for performing tasks such as looking for information about E-mail addresses could be realized as a challenging task. In the current article, we will take a walk in the “thick forest” of Exchange Online and Azure Active Directory infrastructure, and learn…

Post Views: 7,251 The current article is the continuation of the former article in which we review various management tasks that relates to the subject of – Managing E-mail address using PowerShell. In this article, we review that following types of management tasks: Display information about E-mail addresses. Searching for information about E-mail addresses. Removing…

Post Views: 18,258 Our focus in this article is – the administrative task of “adding” E-mail address using the PowerShell cmdlets – Set-Mailbox. The subjects that we will review are: The two methods of adding a NEW E-mail address – replacing the existing email address versus adding a NEW E-mail address. The different type of…

Post Views: 9,079 The current article is the contention of the former article, in which we review the task of adding an E-mail address to Exchange Online recipients using PowerShell. The focus of this article is – how to perform the task of adding an additional E-mail address in a Bulk mode. Adding E-mail addresses…

Post Views: 14,749 In the current article, we review the way we use PowerShell for – adding and updating Exchange recipient’s E-mail address, by importing the information stored in a CSV file. Manage E-mail address by using CSV file | Bulk mode In the next section, we review a couple of scenarios in which we…

Post Views: 9,941 In this article, we review that basic PowerShell command syntax that we use for display information about the E-mail addresses of Exchange Online recipients. In addition, we review the PowerShell command syntax that we use in case we need to export the PowerShell command output the various type files such as –…

Post Views: 6,030 In this article, we review that subject of – how to create a Hash table + Custom expressions as a “tool” that we can use for optimizing and manipulating the PowerShell output in scenarios of – Get information about recipient’s E-mail addresses. We will learn how to create a Hash table +…

Post Views: 23,600 The current article is the second article in our two-article series. In this article, we review how to use the Get-MessageTrace PowerShell command for viewing and exporting information about incoming and outgoing mail transactions that are stored in the Exchange Online log files. In the former article, we review in details the…

Post Views: 15,796 In the current two-article series, we review the Exchange Online PowerShell command Get-MessageTrace, that is used to view and export information about incoming and outgoing mail transaction that are saved in the Exchange Online Logfiles. In the first article, we provide a basic introduction to the Get-MessageTrace PowerShell command, and to her…

Post Views: 15,864 In the current article, we review how to change and manage the default settings of “saving mail items,” in a scenario in which recipient sends E-mail using another recipient “identity” (other recipient E-mail addresses). By default, when recipient A send E-mail on behalf of recipient B, the sent mail items will be…

Post Views: 11,947 The current article, is the continuation of the former article, in which we provide a basic introduction to the subject of the way that we write a PowerShell command, the loop through an array using the “ForEach” statement. The Creating a loop through an array Using the “ForEach” PowerShell article series, including…

Post Views: 6,398 In the current article, I would like to provide a basic introduction to the concept of “Array” and the “ForEach statement”, in PowerShell based environment (especially in Office 365 and Exchange Online based environment). The Creating a loop through an array Using the “ForEach” PowerShell article series, including the following articles: Creating…

Post Views: 5,761 In the current article, we review how to add Full Access permissions to a specific mailbox in an Office 365 based environment. The assignment of the “Full Access mailbox permissions” is a simple operation, that is implemented by using the Exchange Online web-based management interface. The other half of the Full Access…

Post Views: 11,962 The current article is fifth and the last article in our article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell. Manage Distribution Group using PowerShell in Office 365 | Article Series Manage Distribution Group using PowerShell in Office 365…

Post Views: 10,780 The current article is that Fourth article on the five-article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell.The article includes two main sections: Management tasks that relate to the need for viewing information about Distribution Group settings, Distribution Group…

Post Views: 16,117 The current article is that third article on the five-article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell. The article is dedicated to the subject of adding members to existing Distribution Group by using PowerShell. Manage Distribution Group using…

Post Views: 12,531 The current article is that second article on the five-article series, which is dedicated to the subject of managing Distribution Group in Office 365 and Exchange Online based environment using PowerShell.The article includes two main sections: Creating New Distribution Group. Configure the setting of existing Distribution Group. Manage Distribution Group using PowerShell…

Post Views: 7,131 By default, the Office 365 password policy is configured to “enforce” Office 365 users to change their password every 90 days (define as “Days before passwords expire”). Technically speaking, this is a good practice from the security perspective because it is highly recommended to “refresh” our password from time to time. In…

Post Views: 6,560 My primary goal in the current articles is to review the way that we use PowerShell as a tool for implementing “filtered search” in the Exchange Online based environment. In some scenarios, we can use built PowerShell cmdlets, that enable us to query Exchange Online about a specific type of recipients. The…

Post Views: 7,754 In the current article, we review the various examples of the way that we use PowerShell, for creating a “Filtered search” in an Office 365 based environment. Use PowerShell for view Office 365 and Exchange Online objects | Article Table of content Using the PowerShell “Where statement” for creating filtered search |…

Post Views: 16,787 The current article series, include three articles that are dedicated to the subject of – using PowerShell for “view” information about Office 365 (Azure Active Directory), and Exchange Online objects. The first article includes a basic introduction to the PowerShell “Where statement,” that we use as a “filter” for getting information about…

Post Views: 6,547 The purpose if the following article is to enable you to use effectively the “Office 365 PowerShell scripts” that I add to my PowerShell articles. The PowerShell script that provides can be described as “Menu based” PowerShell scripts. Each menu performs a particular “task.” To execute a specific “task” all you need…

Post Views: 3,383 In the current article, we describe characters of a typical Exchange Online mailbox restore mistake in Office 365 Directory synchronization environment and describe the characteristics of an optional solution. The restore mistake is – that a NEW Active Directory user created, instead of restoring the original Soft Deleted On-Premise Active Directory user…

Post Views: 3,670 In the current article, can be considered as a “prefix” to the subject which I describe as “the “Problematic Exchange Online mailbox restore scenarios in Directory synchronization environment.” Office 365 and Directory synchronization can consider as a complex environment, that “bind together” two different environments – the On-Premise environment and the “cloud”…

Post Views: 4,146 In the current article, we review how to successfully restore an Exchange Online mailbox, in Directory synchronization based environment, by implementing the best-practice procedure. In Office 365 environment that uses Directory synchronization (when the user account synchronized from the On-Premise Active Directory to the Office 365 Directory), the restore process of an…

Post Views: 7,657 In the current article, we review the process of restoring a deleted user account by using the Active Directory recycle bin. Technically speaking, the Active Directory recycle bin, can be used for restoring any type of “Active Directory object” such as – user account, computer account, group account and so on. The…

Post Views: 5,409 In the current article, we will review the process of restoring Active Directory deleted a user, in a scenario in which the Active Directory recycle bin was not enabled (activated). In the former article, we review the restore process by using a built-in windows server tool named – LDP.EXE. In the current…

Post Views: 5,756 In the current article, we will review the process of restoring Active Directory deleted the user, in a scenario in which the Active Directory recycle bin was not enabled (activated).We will review how to restore deleted Active Directory object by using a built-in Windows server tool named – LDP.EXE. The LDP.EXE was…

Post Views: 5,420 In the following article, I would like to provide a high-level review on the subject of – “Restoring Soft Deleted Active Directory User account.” We will review the following subjects: The method that the Active Directory uses for storing deleted objects such as User account. The two main Active Directory methods, that…

Post Views: 4,409 In this article, we continue to review the special characters of Office 365 Directory synchronization environment, so we will be able to understand better the “flow of events” in Office 365 Directory synchronization environment. We will review the events flow of three major scenarios: The event of – Creating a NEW Active…

Post Views: 4,669 In the current article and the next article, we review the main characters of the Directory synchronization process in an Office 365 based environment.The reason that I add two dedicates articles, or this subject is, because of the knowledge about “what happens behind the scenes” of the Directory synchronization, is very crucial…

Post Views: 4,720 In the current article, we review the second option for restoring Soft Deleted Exchange Online mailbox. In this scenario, we “Instantiate” the restore process by using a PowerShell command (Undo-SoftDeletedMailbox), that will restore the Soft Deleted Exchange Online mailbox, and also, create a NEW Office 365 user account that will associated with…

Post Views: 3,218 In the current article, we review the required steps for recovering Soft Deleted Exchange Online mailbox by restoring the Office 365 user account that considered as the Exchange Online mailbox owner. In the former article, we prepare all the required setting for simulating the “deletion event.” In this article, we will continue…

Post Views: 3,986 In the following article, we will review the restore process of the Exchange Online user mailbox. We will demonstrate two options for restoring a deleted Exchange Online User mailbox. Option 1#2 – Restore the Office 365 user account. In the current article and the next article, we demonstrate the method of –…

Post Views: 10,165 In the following article, we will review the restore process of Exchange Online Shared mailbox. We will demonstrate two options for restoring a deleted Exchange Online Shared mailbox: Restore the Office 365 user account, that was the owner of the deleted Shared mailbox. The restore process will be implemented by using the…

Post Views: 6,401 In the following article, we will review the restore process of the Exchange Online Room mailbox. We will demonstrate two options for restoring a deleted Exchange Online Room mailbox: Restore the Office 365 user account, that was the owner of the deleted Room mailbox. The restore process will be implemented by using…

Post Views: 3,392 The current article serves as an index, for the different Exchange Online mailbox restore scenarios, which appear along the current article series that include 23 articles. The purpose of this “index” is, to help you to quickly and efficiently locate the specific Exchange Online mailbox restore scenario that you need to deal…

Post Views: 5,107 In the current article, we will review in high level the different options, for recovering Exchange Online mailbox.Before we dive into the deep water off – “Exchange Online restores mailbox scenario” and specific details of the restore process that will be reviewed in the next articles in the current article series. It’s…

Post Views: 3,719 In the current article, we review the possible causes that lead to a scenario, in which Exchange Online mailbox is deleted.The logical assumption is that “mailbox deletion event” not just happens, but instead, the person that acts as the Exchange Online administrator, performs the mailbox deletion consciously. In reality, there are many…

Post Views: 4,146 In the current article, we continue to review different concepts and components that relate and involved throughout the process of restoring Exchange Online mailbox. We will start by describing a concept which I define as “Falling domino effect,” that relates to the chain of an event in an Office 365 based environment…

Post Views: 18,242 The current article series deal with the subject of – restoring or recovering a deleted mailbox in Office 365 (Exchange Online) environment. The interesting thing about “Restore deleted mailbox” in an Office 365 based environment is, that most of the time, most of us (including me), not fully understand what is happening…

Post Views: 14,170 In the current article, we will review how to change the default Exchange Online incoming mail policy, which enables any host, to address Exchange Online using SMTP. A different way of describing such a scenario is – Block SMTP access of external mail servers to Exchange Online. In our scenario, we want…

Post Views: 13,349 In the current article, we review how to configure a WordPress site that is hosted at GoDaddy, and use a Shared Hosting plan, use the GoDaddy SMTP mail server. In our scenario, we use the help of Postman SMTP Mailer/Email Log mail plugin. Before we start, it’s important to me to emphasize…

Post Views: 5,516 In the current article, we continue to review the scenario in which we want to configure our WordPress site to address Exchange Online server, and implement the best-practice scenario, in which we implement an authenticated mail session (providing Office 365 user credentials). The main reason in which users often avoid the best…

Post Views: 11,994 In the current article, we review how to configure a WordPress site, to address Office 365 mail by using the recommended configuration. In a scenario in which our WordPress website serves as a “mail client” that addresses mail server and asks him to be “his mail server,” the best practice is to…

Post Views: 7,476 In the following article, we will provide “step by step” instructions for creating Exchange Online bypass spam rule, that will prevent the “spam check” that the Exchange Online mail server performs for a specific E-mail address. The current article is the continuation of the former article. A quick reminder, in the previous…

Post Views: 17,654 In the current article, we review a scenario in which we need to configure our WordPress site to use Exchange Online as “mail server”.The main character of this scenario is – that we want to configure our WordPress site to address Office 365 mail services without providing any user credentials (anonymously). The…

Post Views: 17,481 In the current article series, we review the steps by step instructions, that are needed for configuring WordPress site to send E-mail by using an SMTP mail server. Generally speaking, the required configuration that is needed depends on three variables: The network infrastructure which hosts the WordPress site The specific characters of…

Post Views: 15,491 In the current article, I would like to review the possibility of a scenario which can be described as Mail loop (other common terms are – Mail storm or “reply back loop”) when using the option of Automatic Reply. The term “Mail loop” and Automatic Reply scenario The term “Mail loop” describes…

Post Views: 5,947 In the current article, we continue to review the steps that are needed for completing the tasks of – creating an Exchange Online shared mailbox that will serve as a “service mailbox” for the service request tickets that will be opened by our organization users. In the former article , we have reviewed…

Post Views: 5,626 The current article is the sequel to the former article, in which we review the process of configuring Public Folder in Office 365 based environment to use the option of an automatic reply. Our specific scenario is quite complicated and include many “parts” (business requirements). In the former article, we have already…

Post Views: 8,667 In the current article, we will review how to configure the option of Automatic replies (Out of office assistant) in Exchange based environment. Most of the time, the activation of the Automatic replies (Out of office assistant) will be implemented by the user himself via the Outlook or the OWA graphic interface.…

Post Views: 9,624 In the current article series, we will review the different options for implementing Automatic Reply in Office 365 (Exchange Online) based environment. Corresponding terms are Automatic respond, Autoresponder, Automatic replies or, Out of office. The term “Automatic reply” (and of the equivalent terms) defines a configuration in which we configure a specific…

Post Views: 22,390 In the current article, we will review the subject of managing SPF record in an Office 365 based environment.The tasks that we will examine are: How to get the value of the SPF record that represents the Office 365 mail servers. How to create the new SPF record in the DNS server.…

Post Views: 7,601 One of our Office 365 recipients complains that the E-mail that he sent to an external recipient is blocked or classified as a “spam mail.” Our underlying assumption is that the problem is related to “Office 365 infrastructure” and they should immediately fix the problem! In the following article, we will learn…

Post Views: 17,165 One of our user’s reports that he experiencing a strange phenomenon when he connects to his Exchange mailbox: Mail item that sent from the recipient automatically sent to a specific folder instead of the inbox folder, E-mail is automatically forwarded to another recipient and so on.In some scenarios, the problem could be…

Post Views: 16,351 In the current article, we will review how to find the value of the “Office 365 MX record” that represents our domain name which we registered with Office 365. After we registrar our domain name and verify the domain name, Office 365 automatically create a dedicated MX record for each of the…

Post Views: 7,868 In the current article, I would like to review two different settings that relate to the subject of Reply All. 1. The default Office 365 OWA reply settings The first issue is – the default Reply settings of Office 365 OWA mail client. By default, Office 365 OWA mail client Reply settings…

Post Views: 7,182 In the following article, we review additional method for preventing to option to reply to All by using a very nice utility named – NoReplyAll Outlook Add-In Prevent to option of Reply All | Article Series The Prevent to option of Reply All article series, including the following three articles: Prevent the…

Post Views: 4,275 The current article is a continuation of the article series, that deal with the subject of preventing to the option of – Reply All option, in Exchange based environment. In this article, we learn about a fascinating and useful Outlook \ Exchange feature named – organizational forms. The “trick” that we will…

Post Views: 11,836 This is the second article in the article series Prevent to the option of Reply All. In the current article, we will review an additional method for preventing to the option of – Reply All. The method which we use this time is built around a concept in which we send the…

Post Views: 8,382 In the current article series, we will review how to prevent from our organization users to use the option of “Reply All” in Exchange, and Office 365 based environment. We will review four different methods. Each of the methods has advantages and disadvantages versus the “other methods.” I leave you with the…

Post Views: 7,260 In the current article, we review the process of Export information from our Google mail account to a CSV file. The difference from the previous article is that in this scenario, we have Google’s contacts whom their name and their information include non-English characters. Import Google’s contacts| Article Series The Import Google’s…

Post Views: 4,941 In the current article, we review the process of Export information from our Google mail account to a CSV file. Import the contents’ information stored in the CSV file using Outlook and OWA mail client. Import Google’s contacts| Article Series The Import Google’s contacts article series, including the following articles: Import Google’s…

Post Views: 16,104 Organizational Forms are a very useful organization tool, can streamline and improve many repetitive processes. For example – a prepared in advance templates, that used as a reply template for customers, applying for a holiday and much more. The first secret that most of us do not know is, that Outlook includes…

Post Views: 7,697 Exchange Online, offer us a very in-depth and comprehensive information about each mail flow transaction, which occurs in our mail infrastructure. The information about each incoming and outgoing mail transaction which passes via the Exchange Online server is kept for 90 days.The Exchange Online web based management interface enables us to look…

Post Views: 7,219 The current article is the second article in our two article series, in which we review the process of Bulk Import contacts to Exchange Online (Office 365) using PowerShell. The two topics that we will review in this article are: Using a “Bulk Import contacts” PowerShell script. Using the PowerShell script will…

Post Views: 22,074 In Exchange based environment, the term “external contacts” or just “contacts,” describe an Exchange recipient object, which their E-mail address is an external E-mail address (non-organization E-mail address). For example – suppliers, business partners, customers and so on. By default, “external contacts” appear as part of the GAL (global address list) alongside…

Post Views: 29,412 In the current article, we will learn how to create a PowerShell script, which will help us to connect automatically to Office 365 (Windows Azure Active Directory) and Exchange Online, without the need of typing complicated PowerShell commands! The added bonus that I would like to add to this “automation” is –…

Post Views: 13,061 In the following article, we will review how to write and run PowerShell script; that will address the Office 365 mail servers (Exchange Online). Versus the scenario that we have examined in the previous article, we review a situation, in which we address the Office 365 mail server anonymously (without providing user…

Post Views: 17,745 In the following two article series, we review the subject of – how to use a “Send E-mail PowerShell script,” that will use Office 365 mail server as his mail server. The most common use of using “Send E-mail PowerShell script” are Testing the process of sending E-mail to Office 365 mail…

Post Views: 5,097 In the current article, we will review the mail migration scenario in which we “break” existing Exchange permission’s relationship. I use the term “break” because, in this scenario, we are migrating only one partner from the existing “couple” to the cloud. When we migrate Exchange on-Premises mailboxes in the cloud not as…

Post Views: 4,314 In the current article, we will review the scenario in which we migrate Exchange on-Premises mailboxes that have an “existing permission’s relationship” to the cloud as a group. Our purpose is to check what are the Exchange permissions, which will migrate to the cloud, along with the mailbox data. In the next…

Post Views: 6,904 The subject of the Exchange permission’s relationship between migrated mailboxes in the Exchange Hybrid environment could be quite confusing. The term “Exchange permission’s relationship,” try to describe two (or more) mailboxes that have existing permission’s structure between them. When we migrate these mailboxes from their “native environment” to the “other environment” the…

Post Views: 12,811 As mentioned in the previous article, the subject of Exchange permissions relationship in Exchange Hybrid environment can be realized in two major scenarios: Scenario 1 – Cross site permission Scenario 1 – Cross site permission The Exchange permissions that Exchange on-Premises mailbox can have on cloud mailbox and vice versa. Scenario 2…

Post Views: 13,953 The current article series dedicated to the subject of – the available Exchange permissions in Exchange Hybrid environment. The term “Exchange permissions” is realized in two major scenarios: Scenario 1 – Cross site permissions The term “cross site permissions”, define the available Exchange permissions, that we can assign to Exchange on-Premises mailbox…

Post Views: 22,221 The term “Junk Email Filter” defines an Exchange mail security mechanism, that implemented on the “mailbox level.” In Exchange based environment, most of the times, the mail security infrastructure is implemented most of the time in the “server level” (Exchange server). The interesting thing is that also, Exchange enables his recipients, to…

Post Views: 7,843 The current article is the last article in the article series, in which we review how to implement SPF Fail policy using Exchange Online rule. In the present article, we will discuss how to apply the second phase of our project, in which, when the Exchange rule identifies an event of “SPF…

Post Views: 7,714 In the current article, we will review how to implement an SPF Policy for incoming mail by using an Exchange rule. In our scenario, we want to identify an event, in which hostile element tries to execute a Spoof mail attack by presenting himself, as a legitimate recipient who uses an E-mail…

Post Views: 13,685 In the current article, I would have to provide you a useful way, for implementing a mail security policy that relates to an event in which the result of the SPF sender verification check is “Fail.” If we want to be more precise, an event in which the SPF sender verification test…

Post Views: 5,000 In the current article, we will review how to configure Outlook to access a Gmail mailbox manually. In the former article, we have reviewed that how to set up Outlook to access a Gmail mailbox automatically. In case that from some reason, the Outlook automatic Gmail mail profile configuration is not working,…

Post Views: 6,891 In the current article, I’m going to reveal a secret that is going to affect humankind permanently – How to configure Outlook to connect Gmail mailbox automatically, without the need for manual settings. If we want to use the most scientific definition – look, mama, no hands! Maybe I’m exaggerating a bit,…

Post Views: 6,620 How can I connect my Outlook mail client to Gmail mailbox and why does the password window repeatedly prompt, although I write down my correct Gmail E-mail address and password? In the current article series, we will review how to configure Outlook client to connect your “Gmail mailbox”. To be able to…

Post Views: 15,872 Let’s start with the most obvious question – why should I try to simulate spam mail? And the answer is – to test our existing mail security infrastructure. In a modern mail environment, the need for implementing some “security mechanism” which will protect our mail infrastructure from spam mail and other threats,…

Post Views: 9,907 In the following article, we will review how to configure Outlook mail client to connect “Office 365 mailbox” that is hosted on the Exchange Online server by using the IMAP and the SMTP protocol. Generally speaking, Exchange Online provides a variety of methods and protocol, which we can use for connecting to…

Post Views: 35,793 The current article dedicated to the subject of performing a management task that relates to the Send As permission using PowerShell. The Send As permission enables recipient X to send an E-mail message using the identity of a recipient Y. Technically speaking, this method can describe as “impersonation.” In Office 365 based…

Post Views: 12,766 The most common cause for a scenario, in which we fail to start the process of Office 365 cutover mail migration is – the lack of the Exchange on-Premises pre requirements. The primary goals of the current article are: Provide the checklist of Exchange on-Premises pre-requirements Explain in details the reasons for…

Post Views: 3,770 In the current article, I would like to review the chain of events that occurs every time, again and again, in a scenario in which an attacker manages to execute a Phishing mail attack successfully. The reaction of the involved persons is known in advance, and the sad end of the story…

Post Views: 5,308 We are living in a dangerous world that produces many types of threats and risks to our organizational mail infrastructure, to our users and us. In the current article, I would like to review some of the possible damages that we can experience in a scenario, in which Spoof or Phishing mail…

Post Views: 4,073 The unique character of the spoofing attack is – that the “spoof action”, serves as a spearhead for most of the other mail attacks. In other words – the Spoof mail attack is accompanied by an additional type of mail attacks such as Phishing mail attack or spam mail. Spoof mail…

Post Views: 4,650 In the current article, we will continue our journey to the land of “mail threats and dangers,” and this time; our primary focus will be on one of the most dangerous and deadly types of mail attack – the Phishing mail attack! The main points that I would like to emphasize regarding…

Post Views: 3,257 Let’s start with a declaration about a strange phenomenon: Spoof mail attacks and Phishing mail attacks, are well-known attacks, and consider as a popular attack among the “hostile elements.” Most of the existing organizations, do not have effective defense mechanisms against the above attacks, and there is a high chance, at some…

Post Views: 3,873 In the following article, we will review the solution and the methods that we can use for dealing with the threat of – Phishing mail attacks and his derivative Spoof mail attack. What are the Ingredients that needed for successfully dealing with the threat of attacks and Phishing and spoofing mail attacks?…

Post Views: 2,699 The planning stage of the “defense system” that protects our mail infrastructure, and our users from Spoof mail attack, need to begin with a definition of some framework. This framework will serve as a “logical container,” that defines the particular structure and the characters of our defense system, that will need to…

Post Views: 6,925 Spoof mail attack is implemented by a hostile element the try to spoof sender identity. The way for dealing with a Spoof mail attack is, by applying a procedure, which check and verify the sender identity (check if the sender considers as a legitimate sender of a spoofed sender). Using SPF, DKIM…

Post Views: 8,200 The process of “sender verification”, enables us to distinguish between a legitimate sender versus an attacker who spoofs his identity and prevent a possible Spoof mail attack. In the current article, we will review in details three sender verification standard – SPF, DKIM, DMARC and also two sender verification methods that can…

Post Views: 20,263 In the current article, we will demonstrate how to simulate Spoof E-mail attack, that will bypass existing SPF sender verification implementation. The current article series include two articles. The former article is – How can hostile element execute Spoof E-mail attack and bypass existing SPF implementation? | introduction | 1#2 Disclaimer For…

Post Views: 5,460 In the current article series, we will learn about a structured vulnerability of the SPF mail standard, which can be easily exploited by a hostile element. The hostile element that is aware of this SPF vulnerability, can bypass the existing “SPF wall” that was built for protecting our organization recipients from Spoofing…

Post Views: 4,871 In case that your organization experiences a scenario in which your mail server IP address appear in the Office 365 blacklist, and E-mail messages sent from your mail server is rejected by the Office 365 mail infrastructure (Exchange Online), you can use the Office 365 “delist portal”, which enable you to submit…

Post Views: 32,276 In the current article, we will review the process of – How to enable outbound DKIM signing in Office 365 for our public domain name. In Office 365 based environment, the process of signing outgoing E-mail using DKIM signature happens automatically for each of the Office 365 tenant domain names. I emphasize…

Post Views: 6,329 In a scenario in which we want to use outbound DKIM signing for our public domain name in Office 365 based environment, we will need to generate 4 DNS records that will be used for the required two CNAME records. Regarding the task of the required DKIM DNS records, the primary challenge…

Post Views: 4,828 The desired goal we seek to achieve is – to implement a successful process in which the sender mail infrastructure for use DKIM to Digitally sign the outgoing E-mail message. This option will enable the destination recipient to verify the DKIM data meaning – the sender identity. The purpose of the current…

Post Views: 4,447 DKIM is implemented by using Digital signature. The “Digital signature” method is one of the main building blocks of the Public key infrastructure. In the current article, I want to show you a fraction of an Interesting and wonderful world of Public key infrastructure and, the way that the DKIM uses this…

Post Views: 6,218 DKIM (Domain Keys Identified Mail) is a mail security standard that enables the sender to declare about his “identity” and allows the mail destination infrastructure, meaning the receiving mail server, to verify the identity of the originator. The central paradox regarding a security standard is that most of the time, we don’t…

Post Views: 4,143 In the current article, we will review two subjects that relate to a scenario in which organization experiences a Spoof E-mail attack: Report the Spoof E-mail as “Phishing mail”. Sent the Spoof E-mail for further analysis. Report Spoof E-mail as “Phishing mail” I try to get additional information regarding the subject of…

Post Views: 14,309 In the current article, we will demonstrate three options for accomplishing the task of simulating E-mail spoof attack. Our primary goal is performing a test, in which verify if the Exchange Online Spoof E-mail rule that we have created is manage to identify an event of Spoof E-mail and respond accordingly. Disclaimer…

Post Views: 4,634 When we hear the term “spoof E-mail attack,” the initial association that appears to our mind is – a hacker sitting in a dark room, filled with flashing lights, which quickly tap the keyboard commands and strange markings! Sound romantic? Well, in reality, the ability to perform or simulate E-mail spoof attack…

Post Views: 4,502 In the current article, we will review the options that are available for analyzing the result of the Exchange Online Spoof E-mail rule that we have created. The term “analyze” relate to our ability to answer fundamental questions such as: How many times the Exchange Online rule that we have created was…

Post Views: 4,148 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online user quarantine. In our scenario, we don’t want…

Post Views: 3,401 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online administrative quarantine. In our particular scenario, we don’t…

Post Views: 7,604 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Add a disclaimer to the E-mail message. Prepend the E-mail subject. Generate +…

Post Views: 4,004 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Delete (reject) the E-mail . Generate + send an incident report to a…

Post Views: 4,494 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Mark the E-mail as spam by setting the SCL (spam confidence level) value…

Post Views: 4,396 In this article, we will review the subject of – “how to create an Exchange Online rule exception. As the name implies, the “exceptions” part of the Exchange rule was created to prevent the execution of the Exchange Online rule in a specific scenario. In the current article, we will continue to…

Post Views: 5,521 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response, will generate and send an incident report to a designated recipient. In our scenario, we want…

Post Views: 9,397 An organization IT manager call to Office 365 supports, worried and upset, declaring that he is very disappointed about the fact that “Office 365” allow the occurrence of a spoofed E-mail attack! Besides of the urgent need for understanding, how could this happened; the additional urgent need is – to implement some…

Post Views: 4,241 The current article is the continuation of the former article in which we review that subject of the required settings that need to be configured for implementing a scenario in which Exchange Online to forward E-mail to on-Premises FAX. The demonstration will include two phases. Creating the required Exchange Online send (outbound)…

Post Views: 7,926 In the current article and the next article, we will review a scenario in which we need to use the Exchange Online infrastructure for – “forward” E-mail messages that need to be sent as an FAX message, to an FAX service that is hosted on an external network, such as our On-Premises…

Post Views: 10,429 In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule. The example that we will review in the current article is – an E-mail attachment policy that stops E-mail messages that have an executable content (executable attachment). As we learn in the…

Post Views: 5,483 In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule. The example that we will review in the current article is – an E-mail attachment policy, that stop E-mail messages that include an attachment with a specific file extension. Manage E-mail attachment…

Post Views: 5,573 In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule.The examples that we will review in the current article are as follows: E-mail attachment policy that stops E-mail messages, that include a password-protected attachment. Each E-mail message that has this type of…

Post Views: 16,390 The subject of E-mail Message attachment manifests itself in two main scenarios: Malware scenario – a scenario that relates to an event, in which hostile element attached some malware to an E-mail message, send the E-mail message to one of our organization recipients, the recipient opens the E-mail message and “excite” the…

Post Views: 6,939 In the following article, I would like to review the subject Exchange on-Premise server, mail relay, authentication and an anonymous session (un-authenticated session). The main reason for writing this article is to try to clarify some of the miss concepts and the confusing terms that used regarding this subject. For example: The…

Post Views: 22,862 The option of “Extended Message Trace” is a very interesting feature of Exchange Online but, the strange thing is that this option is almost never mentioned in any Microsoft formal article and, in addition, the current Exchange Online message trace management interface doesn’t include any Hint about how to “activate” the option…

Post Views: 6,597 Office 365 users report that he cannot connect to his Exchange Online mailbox by using a mobile device. This scenario can be relevant to ” new Office 365 users” or to the existing Office 365 users that manage to connect to his Exchange Online mailbox using a mobile device, but now he…

Post Views: 6,787 In the current article, we will complete the last step in which we create the required Exchange Online transport rule that will implement the concept of the “catch all mailbox.” Just a quick reminder – in the former article, we have created a dynamic distribution group named – “All of Office 365…

Post Views: 20,969 The request for “catch all mailbox” feature is very popular among Office 365 customer’s.The term “catch all mailbox“, define a concept of mail services, in which a dedicated mailbox is designated as a special mailbox that will “accept” all the E-mail messages that was sent to “non-existing organization recipients”. The “business need”…

Post Views: 8,424 In the current article, we will review three subjects that relate to mailing flow scenario that based on TLS communication. Verify mail server TLS configuration In a scenario in which we create all the required TLS configurations, but for some reason, the mail communication failed. We need to be able to understand…

Post Views: 5,716 In the current article and the next article, we will review a very interesting feature that exists in Exchange Online server and Exchange 2013 on-Premises, which enable us to “activate” the option of Force TLS option using an Exchange Online Transport rule The use of Transport rule for implementing the option of…

Post Views: 7,108 In the current article, we will review the required configuration settings for implementing Force TLS in Exchange on-Premises based environment. In our specific scenario, we need to configure the Force TLS option for the “incoming mail flow”. The meaning is – mail that sent from external mail server to the Exchange on-Premises…

Post Views: 15,210 In the current article, we will review the required configuration settings for implementing Force TLS in Exchange on-Premises based environment. In our specific scenario, we need to configure the Force TLS option for the “outgoing mail flow“. The meaning is – mail that is sent by the Exchange on-Premises server to a…

Post Views: 9,463 In the current article, we will review the required configuration settings for implementing Force TLS in Exchange Online based environment. In our specific scenario, we need to configure the Force TLS option for the “incoming mail flow”. The meaning is – mail that sent from external mail server to the Exchange Online…

Post Views: 5,481 In the current article, we will review the required configuration settings for implementing Force TLS in Exchange Online based environment. In our specific scenario, we need to configure the Force TLS option for the “outgoing mail flow”. The meaning is – mail that is sent by the Exchange Online server to a…

Post Views: 4,119 In the current article, is consists of two parts: The part in which we provide a high-level review of the differences that exists between the Exchange on-Premises based environment versus the Exchange Online based environment regarding mail connectors and TLS settings. The reason for examining these differences is, that there are much…

Post Views: 12,148 In the current article, we will review the subject of Force TLS in Exchange on-Premises based environment. In Exchange on-Premises based environment, we can choose to implement the option of Force TLS using two options. 1. Domain Security This option defines a set of mail connectors and configuration settings that serve for…

Post Views: 7,874 In the following article, we will review in more details that implementation of opportunistic TLS on Exchange on-Premises based environment and also in the Exchange Online-based environment. As mentioned, in the Exchange-based environment, the Exchange mail connectors are automatically configured to use the option of opportunistic TLS. The configuration of opportunistic TLS…

Post Views: 14,465 In the current article, we will review the two “flavor” of TLS in the Exchange-based environment.The two options for implementing TLS are opportunistic TLS and Force TLS. Exchange-based server (Exchange on-Premises and Exchange Online) are configured by default to use the option of opportunistic TLS. The meaning is that given that the…

Post Views: 4,773 The purpose of the current article series is, to review the implementation and the use of the TLS protocol in an Exchange-based environment.We will examine the utilization of the TLS protocol in two Exchange environments: Exchange Online Exchange on-Premises The article series The article series that is dedicated to the subject of…

Post Views: 5,869 Clutter is an Exchange Online feature that was created for optimizing the management of the user mailbox by relocating not important or non-relevant E-mail message to Clutter folder In a case that you want to disable the option of Clutter, you can use the OWA web interface for disabling the Clutter option.…

Post Views: 10,013 The Clutter option is a new Exchange Online feature, which was created for helping Office 365 customers (Exchange Online recipient) to effectively manage their mailbox content by “relocate” non-important or non-Crucial E-mail message to a specific folder named Clutter. The Exchange Online Clutter feature is automatically activated for all Exchange Online recipients…

Post Views: 6,641 To be able to create a remote PowerShell session to Exchange Online, we can use the “Windows built PowerShell console”. We will need to use some “first-time” configurations, and then, the rest of the process includes running the required PowerShell command for connecting to Exchange Online. PowerShell console – First-time configuration To…

Post Views: 12,811 Clutter is a new Exchange server feature that created for facilitating better and more efficient mailbox management by Exchange users. The Clutter feature is implemented by analyzing the Exchange mailbox data and based on a “learning process” and other algorithmic decide which of the mail items is “less important.” The Clutter mechanism…

Post Views: 22,777 Litigation Hold is an Exchange server future that enables us to “freeze” all the mail items that were deleted by the user and keep this mail item in a hidden folder that can be accessed by the Exchange administrator. In other words, each of the mail items that was deleted by Intentionally…

Post Views: 22,022 This current article is the first article in a series of two articles, which describe the process of importing PST files to Office 365 (or if we want to be more accurate Exchange Online mailboxes) by using the AzCopy command line utility. Article series The current article provides a high-level review description…

Post Views: 10,513 This current article is the second article in a series of two articles. In the former article, we review in high level the components and the concepts that involved throughout the process of importing PST files to Exchange Online mailboxes. The current article, serve as a step by step guide which includes…

Post Views: 5,867 In the current article, we will review the subject of Exchange stage migration and the issue of configuring new Outlook mail profile for users whom their mailbox migrated to the cloud. The current article deals with the “theoretical part”, in which we will review the special characters of Exchange stage migration and,…

Post Views: 5,758 The current article is the second article in which we review the subject of the challenges and optional solution for the task of creating a new Outlook mail profile for the users whom their mailbox was migrated to Exchange Online using an Exchange stage migration. Exchange Stage migration and Autodiscover infrastructure |…

Post Views: 11,267 The current article, is the continuation of the previous article , in which we will continue to review in details the Autodiscover journey in Exchange Hybrid based environment Autodiscover flow in an Exchange Hybrid environment | The article series The current article is the last article in a series of three articles.…

Post Views: 7,859 The current article and the next article, will be dedicated for detailed review of the Autodiscover flow, that is implemented in Exchange Hybrid environment, by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). Autodiscover flow in an Exchange Hybrid environment | The article series The current article is the…

Post Views: 29,573 The Autodiscover flow in an Exchange Hybrid based environment can be considered the most complex flow because the Autodiscover “journey” implemented in two different environments. Regarding users whom their mailbox migrated to the “cloud” (Exchange Online), the Autodiscover journey will start by the Autodiscover client by addressing the Exchange on-Premises infrastructure. Autodiscover…

Post Views: 7,409 The current article is the continuation of the previous article, in which we review the Autodiscover flow that implemented in an Office 365 based environment, by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). Autodiscover flow in an Office 365 environment | The article series The current article is…

Post Views: 13,609 The current article and the next article will be dedicated to detailed review of the Autodiscover flow; that implemented in an Office 365 based environment by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). The Autodiscover in Office 365 environment includes many steps. I have tried to separate each…

Post Views: 5,592 The current article is the continuation of the previous article, in which we review the Autodiscover flow that implemented in Autodiscover flow in a non-Active Directory environment. In this article, we will inspect the Autodiscover flow by using the Microsoft web-based tool, the Microsoft Remote Connectivity Analyzer (ExRCA). Autodiscover flow in non-Active…

Post Views: 21,546 The Autodiscover flow in an Office 365 based environment can be considered as a fascinating process because the way that Autodiscover client locates their Autodiscover Endpoint, includes many twists and turns. Autodiscover flow in an Office 365 environment | The article series The current article is the first article on a series…

Post Views: 7,535 The current article, we review the Autodiscover algorithm that Autodiscover client uses in a “non-Active Directory environment.” The Autodiscover Toolbox offers a verity of methods which the Autodiscover client can use when he tries to locate his Autodiscover Endpoint. Autodiscover flow in non-Active Directory environment| Article Series The Autodiscover flow in non-Active…

Post Views: 7,351 Autodiscover client uses a different Autodiscover method for locating the Autodiscover Endpoint in an On-Premise Active Directory based environment versus a non-Active Directory environment. The Autodiscover client verifies if he is located in an Active Directory environment or not. If he decides that he located in a non-Active Directory environment, the Autodiscover…

Post Views: 4,710 In the following article, we will review seven major common Autodiscover flow in a different environment. The review is a high-level review and not a detailed examination that deals with each of the specific steps and process that are involved. The purpose – in the continuation of the current series of articles,…

Post Views: 13,271 The current article is the last article in the Autodiscover troubleshooting tools article series. In this article, we will review a fascinating tool named – Fiddler, that can help us in our task of capturing and analyzing Autodiscover data that passed between the Autodiscover client and the Autodiscover Endpoint throughout the Autodiscover…

Post Views: 17,619 In the current article, we will learn to know the ExRCA also known as Microsoft Connectivity Analyzer web-based tool, that serves as the name implies for testing and analyzing information that is related to “relationships” of different Exchange clients with their Exchange server. Autodiscover Troubleshooting tools | The article series The article…

Post Views: 35,130 In the current article, we will review one of the most useful and “strongest” Autodiscover troubleshooting tools, Outlook client built-in tool named: Test E-mail AutoConfiguration. Autodiscover Troubleshooting tools | The article series The article series include the following articles: Outlook Test E-mail AutoConfiguration | Autodiscover troubleshooting tools | Part 1#4 | Part…

Post Views: 4,787 The article is all about the subject of the security mechanism that is implemented as part of the Autodiscover process. Autodiscover and security Autodiscover mechanism includes three major parts: Locating the Autodiscover Endpoint Getting the Autodiscover information \data Using the Autodiscover information In the current article, we relate to the “middle part”…

Post Views: 4,394 The current article is the second article in which we review the concept of Exchange infrastructure and the use of a single namespace. In the former article, we review the concept and the reason for the recommendation of using an Exchange single namespace. The present article focused on a scenario in which…

Post Views: 6,432 In the current article, we will review the subject of – “Invalid Fully Qualified Domain Names” in SAN certificate. The interesting thing is that hostname (2014), there is not too much public information about this subject, but although this topic seems to be minor and not “cool”, the Implications of this new…

Post Views: 4,335 Exchange on-Premises infrastructure was designed to serve the need of a small company and at the same time, meet the needs of an enterprise business that needs to provide mail services to thousands or even tens of thousands of users. The main characters of enterprise environment are: The use of multiple Exchange…

Post Views: 5,317 The current article is dedicated to the Interesting and not so clear subject of – Exchange Infrastructure namespace. Exchange server architecture, enable us to use a different interface with internal Exchange clients versus external Exchange clients that based on various namespace. The major question that I will try to answer in this…

Post Views: 15,557 Outlook client entirely depends on the Autodiscover service as an infrastructure for his relationship with the Exchange server. This dependence relates to the initial phase in which Outlook needs to get the required information for creating a new mail profile and later the ongoing communication process with the Exchange infrastructure. It all…

Post Views: 7,234 In the following article, we look “under the hood” of the Autodiscover method that implemented in Active Directory-based environment. In the Active Directory-based environment, the process in which the Autodiscover client such as Outlook locates available Autodiscover Endpoint performed by addressing the Active Directory as a source of information for available Autodiscover…

Post Views: 6,001 The current article will be dedicated to the subject of Exchange clients that access Exchange services from a public network. The focus is on the “public Exchange clients” because, the characters of the communication channel between the Exchange server and his Exchange client in a public environment, have a different character from…

Post Views: 5,213 In the current article, we will review the basic concepts of the Autodiscover flow, which is implemented by internal Outlook clients. The term “internal”, relate to a private network environment that has On-Premise Active Directory. Getting Autodiscover information The first part of the Autodiscover process implemented by the phase in which the…

Post Views: 16,922 The current article should provide us a small glimpse to the subject of managing the internal and the external Exchange URL address of the different services. We will review a couple of examples to the interfaces the available to us for managing the variety of Exchange services – the graphical interface and…

Post Views: 9,046 In the current article, we will review the subject of the Autodiscover response content. The term – “Autodiscover response” relates to the Autodiscover information that the Exchange CAS server provides to his Autodiscover client.In this article, we will refer to the Exchange Server Autodiscover response content from the perspective of the three…

Post Views: 14,569 The communication channel that between Exchange client and Exchange server is based on a simple concept, in which Exchange client address the Exchange server by using the Exchange host name or, if we want to be more accurate – the Exchange server FQDN. The variety of the services that are offered by…

Post Views: 4,346 One of the most confusing and unclear subjects in the Exchange architecture is what I describe as – “the dual identity of the Exchange server”. I use the term “dual identity” because the Exchange server relates in a different way to Exchange client that located on the internal \Private network versus the…

Post Views: 4,202 The current article focused on the two primary responsibilities of the Exchange CAS server: Exchange CAS server as an information provider (Autodiscover information). Exchange CAS server as Exchange web service provider. The current article is the continuation of the previous article –xx. In the former article, we have reviewed the Exchange CAS…

Post Views: 6,938 In this article, I would like to review the secret romance of Exchange mail clients and “his” Exchange CAS server. Exchange clients have very unusual and exciting relationships with their Exchange CAS server and, the Autodiscover infrastructure is the glow that unified these two lovers. Continue with our romantic metaphor; the truth…

Post Views: 4,634 The Autodiscover algorithm that is used by the Autodiscover client for locating his “source of information” (the Exchange CAS server), is based on a very sophisticated algorithm, that was designed to overcome and bypass many types of “obstacles’” and operate in different networking environments. In the current article, we will review the…

Post Views: 4,664 Exchange Autodiscover is relating to “information” from three different perspectives: Autodiscover is the tool that Exchange client uses for getting information about the Exchange infrastructure. Autodiscover is the method in which Exchange CAS server provides information to his Exchange clients. Autodiscover is the information itself. In the following article, I would like to…